Cloudera Security
This guide is intended for system administrators who want to secure a cluster using data encryption, user authentication, and authorization techniques. This topic also provides information about Hadoop security programs and shows you how to set up a gateway to restrict access.
Cloudera strives to consolidate security configurations across several projects. The process of securing an enterprise data hub comprises at least the following operations:
- Perimeter Security and Authentication: Guarding access to the system, its data, and its various services.
- Entitlement and Access: Defining and enforcing what users and applications can do with data.
- Data Protection: Protecting data from unauthorized access either while at rest or in transit.